- 36
- 0
- 约 9页
- 2015-10-01 发布于河南
- 举报
Computer crime.pdf
Computers Security Vol.20, No.8, pp.715-723, 2001
Copyright © 2001 Elsevier Science Limited
Printed in Great Britain. All rights reserved
0167-4048/01$20.00
Computer crimes: theorizing
about the enemy within
Gurpreet Dhillon and Steve Moores
College of Business, Box 456009, University of Nevada, Las Vegas, NV, 89154-6009, USA
Tel: (702) 895 3676; Fax: (702) 895 4370, Email: dhillon@
Abstract of personal factors, work situations and available
opportunities.These insiders may be dishonest or dis-
A majority of computer crimes occur because a cur- gruntled employees who would copy, steal, or sabotage
rent employee of an organization has subverted exist- information, yet their actions may remain undetected.
ing controls. By considering two case studies, this Such illegal and often malicious acts can have serious
paper analyzes computer crimes resulting because of consequences for a business, yet many companies do
violations of safeguards by employees.The paper sug- not follow the proper procedures so as to prevent ille-
gests that various technical, procedural and normative gal activities from taking place.This includes having a
controls should be put in place to prevent illegal and system of controls in place to help prevent an employ-
malicious acts from taking place. Ult
您可能关注的文档
- Citrix_-常见问题.docx
- Citrix_XD5安装部署V1.1.pdf
- Citrix_XD与VMware_View方案分析.pptx
- Citrix_XenApp_5_FP2_for_windows_2016基本安装配置.pdf
- Citrix_XenDesktop5.46.0虚拟桌面安装部署配置手册署.pdf
- Citrix_XenServer_5.6技术手册.pdf
- Citrix_XenServer_HA_Quick_Start_Guide.pdf
- Civil Society with Chinese Characteristics.pdf
- CK1327数控管子螺纹车床项目可行性研究报告.pdf
- CK6110数控车床生产线改造项目可行性研究报告.pdf
原创力文档

文档评论(0)